Page 3 of 26 results (0.003 seconds)

CVSS: 2.1EPSS: 0%CPEs: 17EXPL: 2

The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket. • https://www.exploit-db.com/exploits/19346 http://marc.info/?l=bugtraq&m=87602167418317&w=2 http://marc.info/?l=bugtraq&m=87602248718482&w=2 http://www.iss.net/security_center/static/7172.php http://www.securityfocus.com/bid/456 •

CVSS: 10.0EPSS: 2%CPEs: 20EXPL: 0

NFS cache poisoning. • https://www.cve.org/CVERecord?id=CVE-1999-0165 •

CVSS: 5.0EPSS: 5%CPEs: 8EXPL: 0

Malicious option settings in UDP packets could force a reboot in SunOS 4.1.3 systems. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0217 •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba http://www.ciac.org/ciac/bulletins/e-01.shtml http://www.osvdb.org/6436 https://exchange.xforce.ibmcloud.com/vulnerabilities/549 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20 http://www.iss.net/security_center/static/7480.php •